Professional Documents
Culture Documents
Lab Instructions and Lab Answer Key: Installing and Configuring Windows® 7 Client
Lab Instructions and Lab Answer Key: Installing and Configuring Windows® 7 Client
Lab Instructions and Lab Answer Key: Installing and Configuring Windows® 7 Client
6292A
Lab Instructions and Lab Answer Key:
Installing and Configuring Windows 7
Client
Information in this document, including URL and other Internet Web site references, is subject to change without notice.
Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people,
places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain
name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright
laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be
reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic,
mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft
Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft makes no
representations and warranties, either expressed, implied, or statutory, regarding these manufacturers or the use of the
products with any Microsoft technologies. The inclusion of a manufacturer or product does not imply endorsement of
Microsoft of the manufacturer or product. Links may be provided to third party sites. Such sites are not under the control of
Microsoft and Microsoft is not responsible for the contents of any linked site or any link contained in a linked site, or any
changes or updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission received from
any linked site. Microsoft is providing these links to you only as a convenience, and the inclusion of any link does not imply
endorsement of Microsoft of the site or the products contained therein.
Module 1
Lab Instructions: Installing, Upgrading, and Migrating to
Windows 7
Contents:
Exercise 1: Migrating Settings by Using Windows Easy Transfer 3
Exercise 2: Configuring a Reference Image 5
Exercise 3: Deploying a Windows 7 Image 7
2 Lab Instructions: Installinng, Upgrading, and Migrating to Window
ws 7
C
Computers in
n this lab
Be
efore you begin the lab, you
u must start the virtual mach
hines. The virtu
ual machines used at the start of
th
his lab are:
N-DC1
6292A-LON
6292A-LON
N-CL1
6292A-LON
N-VS1
The first set of computers running Windows 7 has been purchased and arrived last week. This first batch
of computers has been allocated to power users in your organization. As part of the deployment process,
you need to migrate user settings from Windows Vista computers to the new Windows 7 computers. In
this exercise, you will migrate user settings for the user named Don from the Windows Vista computer to
the new Windows 7 computer. You will use \\LON-DC1\Data to store Dons profile on a shared network
location during the migration tasks.
Note: 6292A-LON-VS1 is the computer running Windows Vista. 6292A-LON-CL1 is the computer
running Windows 7.
Note: The migration process used in this lab for moving settings from Windows Vista to
Windows 7 also applies to moving settings from Windows XP to Windows 7.
Results: After this exercise, you will have transferred the settings from Dons profile on LON -VS1 to
LON -CL1.
Lab Instructions: Installing, Upgrading, and Migrating to Windows 7 5
As part of the rollout of Windows 7, you are implementing the use of the imaging tools from Microsoft
that are designed for Windows 7. You have already created a Windows PE boot CD with the necessary
drivers for the latest batch of computers to come in.
You have configured the first desktop computer with Windows 7 and all of the necessary applications. All
that remains is to generalize the image by using sysprep and then copy the image to a server.
Before you generalize the image, you need to configure a dynamic IP address. This ensures that
computers configured with this image do not use the same IP address. When multiple computers use the
same IP address, there is a conflict and they are unable to communicate on the network.
Note: 6292A-LON-CL2 is the computer configured with the reference image that you will be
generalizing.
Note: The steps in Task 3 of this exercise are required only because the exercise is being
performed with virtual machines. The legacy network adapter is required because Window PE
includes a driver for the legacy network adapter, but does not include a driver for the synthetic
network adapter.
Generalize
Shutdown Options: Shutdown
Results: After this exercise, you will have created a generalized image of LON-CL2 and stored it on the
network share \\LON-DC1\Data.
Lab Instructions: Installing, Upgrading, and Migrating to Windows 7 7
Eventually, you want to automate the image deployment process by using ImageX, scripts, and the User
State Migration Tool. However, you are unsure of some of the syntax. This is your development test run
performing all actions manually to ensure that you have the correct syntax before creating the scripts.
The main tasks for this exercise are as follows:
Note: 6292A-LON-VS1 is a computer running Windows Vista that the user state information is
captured from. 6292A-LON-CL3 is the new computer that Windows 7 is being deployed to.
f Task 5: Perform initial operating system configuration for the new computer
On LON-CL3, close the command prompt to reboot the computer.
Do not start from the CD or DVD.
Use the following settings:
Country, time and current currency format, keyboard: select the default values
User name: LocalAdmin
Computer name: 6292A-LON-CL3
Password: Pa$$w0rd
Password hint: Local Admin
Do not automatically activate Windows
Accept the license agreement
Ask me later about Windows updates
Time zone, date: select the default values
Network location: Work network
Join the Contoso.com domain in System Properties.
Restart when prompted.
Lab Instructions: Installing, Upgrading, and Migrating to Windows 7 9
Results: After this exercise, you will have applied the reference image to LON-CL3 and applied the user
settings from LON-VS1.
Module 2
Lab Instructions: Configuring Disks and Device Drivers
Contents:
Exercise 1: Configuring Disks 3
Exercise 2: Configuring Disk Quotas (Optional) 6
Exercise 3: Updating a Device Driver 8
2 Lab Instructions: Configuuring Disks and Devicce Drivers
Lab: Con
nfigurin
ng Diskss and Device Drivers
C
Computers in
n this lab
Be
efore you begin the lab, you
u must start the virtual mach
hines. The virtu
ual machines used at the start of
th
his lab are:
N-DC1
6292A-LON
6292A-LON
N-CL1
One Production department computer is used for rendering large engineering drawings. It requires
expanded disk space and fast disks. Initially, a simple volume is requested, but then an application
requires a separate drive letter and the simple volume must be shrunk. Then, more disk space is required,
so a spanned volume is created. Finally a striped volume is created to enhance performance.
The main tasks for this exercise are as follows:
1. Create a simple volume by using Disk Management.
2. Create a simple volume by using Diskpart.exe.
3. Resize a simple volume.
4. Resize a simple volume with Diskpart.exe.
5. Create a spanned volume.
6. Create a striped volume.
Results: After this exercise, you have two additional volumes: a spanned volume drive F of 250 MB and
a striped volume drive G of 2048 MB.
6 Lab Instructions: Configuring Disks and Device Drivers
f Task 3: Test the configured quotas by using a standard user account to create files
1. Log off and then log on to the LON-CL1 virtual machine as Contoso\Adam with a password of
Pa$$w0rd.
2. Create a new folder called G:\Adams files.
3. Copy G:\1mb-file into G:\Adams files.
4. Change into the G:\Adams files folder.
Lab Instructions: Configuring Disks and Device Drivers 7
Results: After this exercise, you have disk quotas enabled for drive G.
8 Lab Instructions: Configuring Disks and Device Drivers
Results: After this exercise, you will have reverted your mouse driver to the original driver.
Module 3
Lab Instructions: Configuring File Access and Printers on
Windows 7 Clients
Contents:
Exercise 1: Create and Configure a Public Shared Folder for All Users 4
Exercise 2: Configuring Shared Access to Files for Specific Users 5
Exercise 3: Create and Share a Local Printer 6
2 Lab Instructions: Configuuring File Access andd Printers on Window
ws 7 Clients
LLab: Connfigurin
ng File Access
A a Prin
and nters on
n Windo
ows
7 Client Compu uters
C
Computers in
n this lab
Be
efore you begin the lab, you
u must start the virtual mach
hines. The virtu
ual machines used
u at the start of
th
his lab are:
N-DC1
6292A-LON
6292A-LON
N-CL1
6292A-LON
N-CL2
Sccenario (sam
me for all ex
xercises)
Coontosos Engin neering Department needs access
a to files that
t are stored
d on a Window ws 7 computerr and
hat are part of the Contoso.ccom domain. The
th T Windows 7 computer ha as a large nummber of files thaat users
re
equire access to.
t Most files can be shared among
a all eng gineering depa artment users; however the morem
se
ensitive files ca
an only be accessed by speciific individualss. The Window ws 7 computer also has an HP P
Ph
hotosmart D74 400 Series colo
or printer attacched to it. Sevveral users wannt to access thiis printer from their
ow
wn computerss.
Create a public share on the Windows 7 computer that all engineering department users are able to
access.
Create a restricted share for specific files that only specific users can access.
Share a printer on the workstation that can be accessed by authorized users.
4 Lab Instructions: Configuring File Access and Printers on Windows 7 Clients
Exercise 1: Create and Configure a Public Shared Folder for All Users
Your first task is to create a shared folder that all engineering users can access.
1. Create a folder.
2. Share the folder.
3. Log on to LON-CL2 as a different user.
4. Access the shared folder.
Results: After this exercise, you will have a folder shared as \\LON-CL1\public. Everyone will have
permissions to connect to this folder. This will also prove that you can access the shared folder and
create files within that folder.
Lab Instructions: Configuring File Access and Printers on Windows 7 Clients 5
1. Create a folder.
2. Share the folder with restricted permissions.
3. Configure NTFS permissions to the folder.
4. Log on to LON-CL2 as Contoso\Terri with the password of Pa$$w0rd.
5. Test Terris permissions to the shared folder.
Results: After this exercise, you will have created a folder with restrictive NTFS permissions and verified
that the permissions are applied correctly.
6 Lab Instructions: Configuring File Access and Printers on Windows 7 Clients
Results: After this exercise, you will have a created and shared a local printer and configured access to
the printer.
Lab Instructions: Configuring Network Connectivity 1
Module 4
Lab Instructions: Configuring Network Connectivity
Contents:
Exercise 1: Configuring IPv4 Addressing 3
Exercise 2: Configuring IPv6 Addressing 5
Exercise 3: Troubleshooting Network Connectivity 7
2 Lab Instructions: Configuuring Network Conneectivity
Lab: Con
nfigurin
ng Netw
work Co
onnectiv
vity
C
Computers in
n this lab
Be
efore you begin the lab, you
u must start the virtual mach
hines. The virtu
ual machines used at the start of
th
his lab are:
6292A-LON
N-DC1
6292A-LON
N-CL1
Note: LON-CL1 is the computer running Windows 7 where you will configure IPv4 addressing.
LON-DC1 is the computer running Windows Server 2008 R2 that is running the DHCP service.
Results: After this exercise, you will have tested various scenarios for dynamic IP address assignment
and then configured a static IPaddress.
Lab Instructions: Configuring Network Connectivity 5
Note: LON-CL1 is the computer running Windows 7 where you will configure IPv6 addressing. LON-DC1
is the computer running Windows Server 2008 R2 that is running the DHCP service.
Results: After this exercise, you will have configured a static IPv6 address and a dynamic IPv6 address.
Lab Instructions: Configuring Network Connectivity 7
Note: LON-CL1 is the computer running Windows 7 where you will use to troubleshoot IP connectivity.
LON-DC1 is the computer running Windows Server 2008 R2 that is used to test network connectivity.
Results: After this exercise, you will have resolved the connectivity problem between LON-CL1 and
LON-DC1.
Lab Instructions: Configuring Wireless Network Connections 1
Module 5
Lab Instructions: Configuring Wireless Network Connections
Contents:
Exercise 1: Determine the Appropriate Configuration for a
Wireless Network 2
Exercise 2: Troubleshooting Wireless Connectivity 4
2 Lab Instructions: Configuuring Wireless Netwoork Connections
Lab: Con
nfigurin
ng Wire
eless Ne
etwork Connections
Exercise 1: Determine
e the Appropriate Configuratiion for a Wireless
N
Network
Sccenario
Th
he Contoso Coorporation is im
mplementing Windows
W 7 de
esktops throug
ghout their org
ganization. You
u are a
he
elp desk techn
nician in the Co
ontoso Corporration.
Sh
he has requestted help to dettermine what she needs to buy
b for each plant
p and need
ds your input to
o price
th
he project.
Ea
ach plant has a different offiice area with varying
v numbe orkers. You havve established that
ers of office wo
th
he largest plan
nt area is 50 me eters by 50 meeters and has around
a 180 plant workers.
Th
he main tasks for this exercisse are as follow
ws:
1.. eless Network Requirementss document.
Read the Contoso Corporation Producttion Plant Wire
2.. Update the
e document wiith your propo
osed course of action.
N
Note: Your insttructor may run this exercise
e as a class disccussion.
Lab Instructions: Configuring Wireless Network Connections 3
Requirement Overview
I want to deploy wireless networks across all of the production plants in the UK, starting with the largest
in Slough.
Security is critical, and we must deploy the strongest security measures available.
Some of our older computer equipment supports earlier wireless standards only.
Cordless telephones are in use at the plants.
Some of the production plants are located in busy trading districts with other commercial organizations
located nearby. Again, it is important that the Contoso network is not compromised.
Additional Information
What technical factors will influence the purchasing decision for the WAPs that Amy needs to consider?
How many WAPs does Amy need to purchase?
Where will you advise Amy to place the WAPs?
Which security measures will you recommend to Amy?
Proposals
f Task 1: Read the Contoso Corporation Production Plant Wireless Network Requirements
document
Read the Contoso Corporation Production Plant Wireless Network Requirements document.
Results: After this exercise, you will have a proposal for the implementation of wireless networks
throughout the production plants in the UK.
4 Lab Instructions: Configuring Wireless Network Connections
Incident Record
Incident Details
Intermittent connection problems from computers connecting to the Slough production department.
Some users can connect to the Slough wireless access points from the parking lot.
Additional Information
How will you verify that these problems are occurring?
What do you suspect is causing these problems?
How will you rectify these problems?
Plan of action
Results: After this exercise, you will have a completed action plan for resolution of the problem at the
Slough plant.
Lab Instructions: Securing Windows 7 Desktops 1
Module 6
Lab Instructions: Securing Windows 7 Desktops
Contents:
Lab A: Configuring UAC, Local Security Policies, EFS, and AppLocker
Exercise 1: Using Action Center 3
Exercise 2: Configuring Local Security Policies 4
Exercise 3: Encrypting Data 5
Exercise 4: Configuring AppLocker 6
Lab B: Configuring Windows Firewall, Internet Explorer 8 Security
Settings, and Windows Defender
Exercise 1: Configuring and Testing Inbound and Outbound
Rules in Windows Firewall 8
Exercise 2: Configuring and Testing Security Settings in Internet
Explorer 8 10
Exercise 3: Configuring Scan Settings and Default Actions in
Windows Defender 12
2 Lab Instructions: Securinng Windows 7 Desktoops
LLab A: Configu
C ring UA
AC, Loca
al Securrity Policies, EF
FS,
a App
and pLockerr
C
Computers in
n this lab
Be u must start the virtual mach
efore you begin the lab, you hines. The virtu
ual machines used
u at the start of
th
his lab are:
N-DC1
6292A-LON
6292A-LON
N-CL1
Note: LON-CL1 is the computer running Windows 7 where you will configure the Action Center and UAC
settings.
Note: It may take a few minutes for the Virus protection notification to appear.
Results: After this exercise, you will no longer be notified about virus protection. UAC settings will be
set to notify users when programs try to make changes to the computer.
4 Lab Instructions: Securing Windows 7 Desktops
Note: LON-CL1 is the computer running Windows 7 where you will configure and test the local security
policies.
Results: After this exercise, you will have multiple local group policies defined and configured.
Lab Instructions: Securing Windows 7 Desktops 5
The main tasks for this exercise is to secure files by using EFS.
Note: LON-CL1 is the computer running Windows 7 where you will configure and test the EFS.
Results: After this exercise, you will have a local folder and files encrypted with EFS.
6 Lab Instructions: Securing Windows 7 Desktops
Note: LON-CL1 is the computer running Windows 7 where you will configure and test the AppLocker.
Note: If the enforcement rule message does not display, wait for a few minutes and then re-try step 2.
Results: After this exercise, you will have an AppLocker rule configured to prevent users of the Research
department from running Windows Media Player.
Lab Insttructions: Securing Windows 7 Desktops 7
LLab B: Configur
C ring Windows Firewalll, Intern
net
E
Explorerr 8 Secu
urity Setttings, and
a Win
ndows Defender
D
C
Computers in
n this lab
Be
efore you begin the lab, you
u must start the virtual mach
hines. The virtu
ual machines used at the start of
th
his lab are:
6292A-LON
N-DC1
6292A-LON
N-CL1
Note: LON-CL1 is the computer running Windows 7 where you will configure Windows Firewall. LON-
DC1 is the computer running Windows Server 2008 R2 that you will use to test the Windows Firewall
configuration.
f Lab Setup:
Complete these tasks to set up the prerequisites for the lab:
1. Log on to LON-CL1 as Contoso\Administrator with the password of Pa$$w0rd.
2. Click Start, right-click Computer and then click Properties.
3. Click Advanced system settings.
4. Click the Remote tab.
5. Under Remote Desktop, select Allow connections from computer running any version of
Remote Desktop (less secure) and then click OK.
6. Log off of LON-CL1.
4. Configure an outbound rule to block Remote Desktop Connection traffic TCP port 3389.
Results: After this exercise, you will have inbound and outbound firewall rules blocking Remote
Desktop traffic to and from LON-CL1.
10 Lab Instructions: Securing Windows 7 Desktops
Note: LON-CL1 is the computer running Windows 7 where you will configure Internet Explorer 8. LON-
DC1 is the computer running Windows Server 2008 R2 and is hosting a Web site.
Results: After this exercise, you will be able to set various security settings in Internet Explorer 8,
including enabling the compatibility view, configuring InPrivate Browsing and InPrivate Filtering.
12 Lab Instructions: Securing Windows 7 Desktops
Note: LON-CL1 is the computer running Windows 7 where you will configure Windows Defender.
Results: After this exercise, you will be able to set various Windows Defender settings, including the
scan type and frequency, default actions, and the allowed items.
Module 7
Lab Instructions: Optimizing and Maintaining Windows 7
Client Computers
Contents:
Exercise 1: Monitoring System Performance 3
Exercise 2: Backing Up and Restoring Data 5
Exercise 3: Configuring System Restore Points 7
Exercise 4: Configuring Windows Update 8
2 Lab Instructions: Optimizzing and Maintainingg Windows 7 Client Computers
LLab: Opttimizing
g and Maintain
ning Wiindows 7 Clien
nt
C
Comput ters
C
Computers in
n this lab
Be
efore you begin the lab, you
u must start the virtual mach
hines. The virtu
ual machines used
u at the start of
th
his lab are:
N-DC1
6292A-LON
6292A-LON
N-CL1
Note: LON-CL1 is the computer that is running Windows 7 where you will review running
processes by using Resource Monitor and configure data collector sets. LON-DC1 is the computer
that is running Windows Server 2008 R2 that is used for domain authentication.
f Task 3: Configure the data collector set schedule and stop condition
1. Open the properties of the Bottleneck data collector set.
2. Review the keywords defined for Bottleneck.
3. Create a schedule for Bottleneck:
Beginning date: today
Expiration date: one week from today
Launch at 13:00 every day of the week
4. Configure the stop conditions for Bottleneck:
Overall duration: 1 minute
4 Lab Instructions: Optimizing and Maintaining Windows 7 Client Computers
Maximum Size: 10 MB
Results: After this exercise, you will have scheduled a data collector set to run at 13:05 each day and
reviewed the performance data that it gathers.
Lab Instructions: Optimizing and Maintaining Windows 7 Client Computers 5
You have to create the backup job for the laptop and verify that you can recover data.
Note: LON-CL1 is the computer that is running Windows 7 where you will create, back up, and restore a
data file. LON-DC1 is the computer that is running Windows Server 2008 R2 that is used for domain
authentication.
Results: After this exercise, you will have backed up and restored a data file.
Lab Instructions: Optimizing and Maintaining Windows 7 Client Computers 7
1. Enable the restore points for all disks except the backup disk.
2. Create a restore point.
3. Edit the contents of a file.
4. Verify the previous version of a file.
5. Restore a restore point.
Note: LON-CL1 is the computer that is running Windows 7 where you will enable and create restore
points. LON-DC1 is the computer that is running Windows Server 2008 R2 that is used for domain
authentication.
f Task 1: Enable restore points for all disks except the backup disk
1. On LON-CL1, open the System protection settings from the System window.
2. Select the option to Restore system settings and previous versions of files for all drives.
Results: After this exercise, you will have created a restore point, restored the previous version of a file,
and restored a restore point.
8 Lab Instructions: Optimizing and Maintaining Windows 7 Client Computers
After extensive testing, you have determined that it is extremely unlikely that automatic updates will cause
a problem with this application. You have to confirm that automatic updates are disabled for your
Windows 7 computers and enable automatic updates by implementing a Group Policy.
Note: LON-CL1 is the computer that is running Windows 7 where you will configure Windows Update.
LON-DC1 is the computer that is running Windows Server 2008 R2 that is used for domain authentication
and where you will configure automatic updates that use Group Policy.
f Task 3: Verify that the automatic updates setting from the group policy is being applied
1. On LON-CL1, run gpupdate /force to update the group policy settings.
2. Open Windows Update and verify that the new settings have been applied.
Note: If the policy setting does not apply, restart LON-CL1 and then repeat Task 3.
Results: After this exercise, you will have enabled automatic updates by using a group policy.
Module 8
Lab Instructions: Configuring Mobile Computing and
Remote Access in Windows 7
Contents:
Exercise 1: Creating a Sync Partnership 4
Exercise 2: Configuring Power Options 6
Exercise 3: Enabling Remote Desktop 7
Exercise 4: Enabling BranchCache 9
2 Lab Instructions: Configuuring Mobile Computting and Remote Acccess in Windows 7
LLab: Con
nfigurin
ng Mob
bile Com
mputing
g and Re
emote
A
Access in Windows 7
C
Computers in
n this lab
Be
efore you begin the lab, you
u must start the virtual mach
hines. The virtu
ual machines used
u at the start of
th
his lab are:
N-DC1
6292A-LON
6292A-LON
N-CL1
In
ncident Reco
ord
In
ncident Refere
ence Numberr: 502509
D
Date of Call November
N 5th
Time of Call 08:45
0
User Don
D (Productio
on Departmen
nt)
Status OPEN
O
In
ncident Detaills
Don wants you
y to establish a sync partnership with hiss Windows Moobile device.
Don needs the
t power optiions to be connfigured for op
ptimal battery life when he iss traveling.
Lab Instructions: Configuring Mobile Computing and Remote Access in Windows 7 3
Incident Record
Don wants to enable remote desktop on his desktop computer in the office for his own user account
so he can connect remotely to his desktop from his laptop.
Don wants to be able to access documents from the head-office and enable others at the plant to
access those files without delay.
Additional Information
Dons laptop is running Windows 7 Enterprise.
The Slough plant has no file-server at present.
Resolution
4 Lab Instructions: Configuring Mobile Computing and Remote Access in Windows 7
Don is about to visit all the manufacturing plants in the UK. Before he leaves, he wants you to enable and
configure a sync partnership with his Windows Mobile device.
Note: LON-CL1 is the computer running Windows 7 where you will use Windows Mobile Device
Center to synchronize items between Outlook and a Windows Mobile device. LON-DC1 is the
computer running Windows Server 2008 R2, which is used for domain authentication.
Results: After this exercise, you have created a sync partnership and successfully synchronized Dons
Windows Mobile device.
6 Lab Instructions: Configuring Mobile Computing and Remote Access in Windows 7
Note: LON-CL1 is the computer running Windows 7 where you will configure a power plan. LON-DC1 is
the computer running Windows Server 2008 R2, which is used for domain authentication.
f Task 3: Update the incident record with the power plan changes
1. Update the resolution section of incident record 502509 with the information about the successful
configuration of a power plan for Dons laptop.
2. Close any open windows.
Results: After this exercise, you have configured a suitable power plan for Dons laptop computer.
Lab Instructions: Configuring Mobile Computing and Remote Access in Windows 7 7
1. Enable Remote Desktop through the firewall and enable Remote Desktop on Dons office
computer.
2. Configure Remote Desktop Connection settings to connect to the remote desktop.
3. Update the incident with the Remote Desktop changes.
Note: LON-CL1 is the computer running Windows 7 to which you will enable Remote Desktop. LON-DC1
is the computer running Windows Server 2008 R2, which is used for domain authentication.
f Task 1: Enable remote desktop through the firewall and enable Remote Desktop on
Dons office computer
1. On LON-CL1, open Windows Firewall.
2. Enable Remote Desktop through the firewall for all profiles (Domain, Home/Work, and Public).
3. From System, select Remote settings.
4. Select the following options:
a. Select Allow connections from computers running any version of Remote Desktop (less
secure).
b. Add Contoso\Don as a remote desktop user.
5. Confirm your changes and then close any open windows.
f Task 3: Update the incident record with the remote desktop changes
Update the resolution section of incident record 502509 with the information about the successful
configuration of remote desktop for Dons laptop.
Results: After this exercise, you have successfully enabled Remote Desktop.
Lab Instructions: Configuring Mobile Computing and Remote Access in Windows 7 9
Note: LON-CL1 is the computer running Windows 7 to which you will enable BranchCache client settings.
LON-DC1 is the computer running Windows Server 2008 R2 that is used for domain authentication and
where you will enable BranchCache and configure Group Policy Settings.
d. Set percentage of disk space used for client computer cache: Enabled, and configure a value of
10 percent
5. Close Group Policy Management Editor.
6. Close Group Policy Management. Close all open windows.
f Task 8: Update the incident record with the remote desktop changes
Update the resolution section of incident record 502509 with the information about the successful
configuration of BranchCache.
Results: After this exercise, you have enabled BranchCache for the Slough Plant shared folder and
configured the necessary Group Policy settings.
Module 1
Lab Answer Key: Installing, Upgrading, and Migrating to
Windows 7
Contents:
Exercise 1: Migrating Settings by Using Windows Easy Transfer 3
Exercise 2: Configuring a Reference Image 5
Exercise 3: Deploying a Windows 7 Image 7
2 Lab Answer Key: Installing, Upgrading, and Migrating to Windows 7
Note: Steps 1 and 2 must be performed quickly to ensure that you are able to boot from
thevirtual DVD rather than the hard disk. If the operating system starts to boot because you do
not complete the steps quickly enough, then click the Reset button in the virtual machine
window to try again. You may want to take a snapshot of the virtual machine before attempting
to boot from the DVD.
1. In the virtual machine window for 6292A-LON-CL2, click the Start button in the toolbar.
2. Click in the virtual machine window, and press a key when prompted to press a key to boot from CD
or DVD.
3. At the command prompt, type ipconfig and the press ENTER. Verify that an IP address in the
10.10.0.0 range is assigned. This confirms that Windows PE obtained an IP address from the DHCP
server.
4. At the command prompt, type the following command and then press ENTER: net use i: \\lon-
dc1\data /user:contoso\administrator Pa$$w0rd.
5. At the command prompt, type d: and press ENTER. This is the original C: drive on the reference
computer.
6. At the command prompt, type dir and then press ENTER.
7. At the command prompt, type e: and press ENTER. This is a drive created in memory by Windows PE.
8. At the command prompt, type dir and then press ENTER.
9. At the command prompt, type imagex /capture d: i:\Reference.wim Reference Image for
Windows 7 /compress fast and then press ENTER.
f Task 5: Perform initial operating system configuration for the new computer
1. Restart LON-CL3 by closing the command prompt. Do not start from CD or DVD.
2. If prompted, select Start Windows normally and press ENTER. The computer will restart before
asking for any input.
3. In the Set Up Windows box, click Next to accept the default country, time and currency format,
and keyboard layout.
4. In the Type a user name box, type LocalAdmin.
5. In the Type a computer name box, type LON-CL3 and then click Next.
6. In the Type a password and Retype your password boxes, type Pa$$w0rd.
7. In the Type a password hint box, type Local Admin and then click Next.
8. Clear the Automatically activate Windows when Im online checkbox and then click Next.
9. Select the I accept the license terms checkbox and then click Next.
10. Click Ask me later to delay the implementation of Windows updates.
11. Click Next to accept the default settings for time zone and date.
12. Click Work network to select your computers current location.
13. Click Start, right-click Computer, and click Properties.
14. Under Computer name, domain, and workgroup settings, click Change settings.
15. In the System Properties window, click Change.
16. In the Computer Name/Domain Changes window, click Domain, type contoso.com, and then click
OK.
17. Authenticate as Administrator with a password of Pa$$w0rd.
18. Click OK to close the welcome message.
19. Click OK to close the message about restarting.
20. In the System Properties window, click Close.
21. Click Restart Now.
Module 2
Lab Answer Key: Configuring Disks and Device Drivers
Contents:
Exercise 1: Configuring Disks 3
Exercise 2: Configuring Disk Quotas (Optional) 5
Exercise 3: Updating a Device Driver 7
2 Lab Answer Key: Configuring Disks and Device Drivers
6292A-LON-DC1
6292A-LON-CL1
5. In Disk Management, on Disk 2, right-click Unallocated, and then click New Simple Volume.
7. On the Specify Volume Size page, in the Simple volume size in MB box, type 100, and then click
Next.
9. On the Format Partition page, in the Volume label box, type Simple, click Next, and then click
Finish.
3. At the DISKPART> prompt, type list disk, and then press ENTER.
5. At the DISKPART> prompt, type create partition primary size=100, and press ENTER.
8. At the DISKPART> prompt, type format fs=ntfs label=simple2 quick, and press ENTER.
2. In Disk Management, on Disk 2, right-click Simple (F:), and then click Extend Volume.
4. On the Select Disks page, in the Select the amount of space in MB box, type 100, click Next, and
then click Finish.
6. At the DISKPART> prompt, type shrink desired = 100, and press ENTER.
2. In Disk Management, on Disk 2, right-click Simple (F:), and then click Delete Volume.
4. In Disk Management, on Disk 3, right-click simple2 (G:), and then click Delete Volume.
6. In Disk Management, on Disk 2, right-click Unallocated, and then click New Spanned Volume.
8. On the Select Disks page, in the Select the amount of space in MB box, type 100
9. In the Available list, click Disk 3, and then click Add >.
10. In the Selected list, click Disk 3, and in the Select the amount of space in MB box, type 150, and
then click Next.
12. On the Format Partition page, in the Volume label box, type Spanned, click Next, and then click
Finish.
3. On the Select Disks page, in the Available list, click Disk 3, and then click Add >.
4. On the Select Disks page, in the Select the amount of space in MB box, type 1024, and then click
Next.
6. On the Format Partition page, in the Volume label box, type Striped, click Next, and then click
Finish.
3. In the Striped (G:) Properties dialog box, click the Quota tab.
4. On the Quota tab, select the Enable quota management check box.
5. Select the Deny disk space to users exceeding quota limit check box.
6. Click Limit disk space to, in the adjacent box, type 10, and in the KB list, click MB.
7. In the Set warning level to box, type 5, and in the KB list, click MB.
8. Select the Log event when a user exceeds their warning level check box, and then click OK.
9. In the Disk Quota dialog box, review the message, and then click OK.
3. At the command prompt, type fsutil file createnew 1mb-file 1048576, and then press ENTER.
4. At the command prompt, type fsutil file createnew 1kb-file 1024, and then press ENTER.
Note: These filenames enable you to identify them later as being 1 megabyte (MB) and 1
kilobyte (KB), respectively.
f Task 3: Test the configured quotas by using a standard user account to create files
1. Log off, and then log on to the LON-CL1 virtual machine as contoso\Adam with a password of
Pa$$w0rd.
5. In the file list, right-click 1mb-file and drag it to Adams files, and then click Copy here.
10. In the file list, right-click 1kb-file and drag it to Adams files, and then click Copy here.
15. In the Copy Item dialog box, review the message, and then click Cancel.
4. In the Striped (G:) Properties dialog box, click the Quota tab, and then click Quota Entries.
5. In the Quota Entries for Striped (G:), in the Logon Name column, double-click contoso\adam.
6. In the Quota Settings for Adam Carter (CONTOSO\adam) dialog box, click OK.
11. In the Event Viewer (Local) list, expand Windows Logs, and then click System.
13. In the <All Events IDs> box, type 37, and then click OK.
3. Expand Mice and other pointing devices, right-click Microsoft PS/2 Mouse, and then click Update
Driver Software.
4. In the Update Driver Software Microsoft PS/2 Mouse dialog box, click Browse my computer
for driver software.
5. On the Browse for driver software on your computer page, click Let me pick from a list of
device drivers on my computer.
6. In the Show compatible hardware list, click PS/2 Compatible Mouse, and then click Next.
7. Click Close.
8. In the System Settings Change dialog box, click Yes to restart the computer.
4. Expand Mice and other pointing devices, right-click PS/2 Compatible Mouse, and then click
Properties.
5. In the PS/2 Compatible Mouse Properties dialog box, click the Driver tab.
8. Click Close, and then in the System Settings Change dialog box, click Yes to restart the computer.
12. Expand Mice and other pointing devices, and then click Microsoft PS/2 Mouse.
13. Verify that you have successfully rolled back the driver.
2. Right-click each virtual machine name in the Virtual Machines list, and then click Revert.
Module 3
Lab Answer Key: Configuring File Access and Printers on
Windows 7 Clients
Contents:
Exercise 1: Create and Configure a Public Shared Folder for All Users 3
Exercise 2: Configuring Shared Access to Files for Specific Users 4
Exercise 3: Creating and Sharing a Printer 6
2 Lab Answer Key: Configuring File Access and Printers on Windows 7 Clients
Exercise 1: Create and Configure a Public Shared Folder for All Users
f Task 1: Create a folder
1. Log on to LON-CL1 as Contoso\Administrator with the password of Pa$$w0rd.
2. Click Start, click Computer, double-click Local Disk (C:).
3. Right-click in the empty space below the Name column, point to New, then click Folder.
4. Type Public in the folder name and then press ENTER.
Module 4
Lab Answer Key: Configuring Network Connectivity
Contents:
Exercise 1: Configuring IPv4 Addressing 3
Exercise 2: Configuring IPv6 Addressing 6
Exercise 3: Troubleshooting Network Connectivity 8
2 Lab Answer Key: Configuring Network Connectivity
8. At the command prompt, type ipconfig /all, and then press ENTER
9. What is the current IPv4 address?
10.10.11.1
10. What is the subnet mask?
255.255.0.0
Lab Answer Key: Configuring Network Connectivity 5
Module 5
Lab Answer Key: Configuring Wireless Network Connections
Contents:
Exercise 1: Determine the Appropriate Configuration for a Wireless Network 2
Exercise 2: Troubleshooting Wireless Connectivity 4
2 Lab Answer Key: Configuring Wireless Network Connections
Requirement Overview
I would like to deploy wireless networks across all of the production plants in the UK, starting with the largest in
Slough.
Security is critical, and we must deploy the strongest security measures available.
Some of our older computer equipment supports earlier wireless standards only.
Cordless telephones are in use at the plants.
Some of the production plants are located in busy trading districts with other commercial organizations located
nearby again, it is important that the Contoso network is not compromised.
Additional Information
What technical factors will influence the purchasing decision for the WAPs that Amy should consider?
Answers will vary, but should include at least the following points:
Coverage of a WAP
Use of overlapping coverage and the same Service Set Identifier (SSID)
Security options:
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)/Wi-Fi Protect Access version 2 (WPA2)
802.1x
Wireless technology 802.11b or 802.11g
How many WAPs does Amy need to purchase?
Answers will vary, but how much area each WAP must cover is a consideration
Module 6
Lab Answer Key: Securing Windows 7 Desktops
Contents:
Lab A: Configuring UAC, Local Security Policies, EFS, and AppLocker
Exercise 1: Using Action Center 3
Exercise 2: Configuring Local Security Policies 4
Exercise 3: Encrypting Data 6
Exercise 4: Configuring AppLocker 7
Lab B: Configuring Windows Firewall, Internet Explorer 8 Security
Settings, and Windows Defender
Exercise 1: Configuring and Testing Inbound and Outbound
Rules in Windows Firewall 9
Exercise 2: Configuring and Testing Security Settings in Internet
Explorer 8 12
Exercise 3: Configuring Scan Settings and Default Actions in
Windows Defender 13
2 Lab Answer Key: Securing Windows 7 Desktops
Note: It may take a few minutes for the Virus protection notification to appear.
5. Click the Action CENTER icon in the system tray. Notice that there is no message related to virus
protection.
Note: If the enforcement rule message does not display, wait for a few minutes and then re-try step 2.
4. Log off.
Lab Answer Key: Securing Windows 7 Desktops 9
6. Log off.
No.
5. Click OK.
6. Close the Remote Desktop Connection dialog box.
7. Log off of LON-CL1.
12 Lab Answer Key: Securing Windows 7 Desktops
Module 7
Lab Answer Key: Optimizing and Maintaining Windows 7
Client Computers
Contents:
Exercise 1: Monitoring System Performance 2
Exercise 2: Backing Up and Restoring Data 4
Exercise 3: Configuring System Restore Points 6
Exercise 4: Configuring Windows Update 8
2 Lab Answer Key: Optimizing and Maintaining Windows 7 Client Computers
f Task 3: Configure the data collector set schedule and stop condition
1. In the Performance Monitor window, right-click Bottleneck and click Properties.
2. Review the keywords listed on the General tab.
3. Click the Schedule tab and then click Add.
4. In the Beginning date box, verify that todays date is listed.
5. Select the Expiration date checkbox and then select a date one week from today.
6. In the Launch area, in the Start time box, select 1:05 pm.
7. Verify that all days of the week are selected and then click OK.
8. Click the Stop Condition tab.
9. In the Overall duration box, verify that 1 minute is selected.
10. In the Limits area, select the Maximum size checkbox, type 10 and then click OK.
5. Wait for the computer to restart and then log on as Contoso\Administrator with a password of
Pa$$w0rd.
6. In the System Restore window, click Close.
8 Lab Answer Key: Optimizing and Maintaining Windows 7 Client Computers
f Task 3: Verify that the automatic updates setting from the group policy is being applied
1. On LON-CL1, click Start, type gpupdate /force and then press ENTER.
2. Click Start and click Control Panel.
3. Click System and Security and then click Windows Update.
4. Click Change settings and review the available settings. Notice that you can no longer change the
settings because they are being enforced by the group policy.
5. Click Cancel and then close the Windows Update window.
Note: If the policy setting does not apply, restart LON-CL1 and then repeat Task 3.
Module 8
Lab Answer Key: Configuring Mobile Computing and
Remote Access in Windows 7
Contents:
Exercise 1: Creating a Sync Partnership 3
Exercise 2: Configuring Power Options 5
Exercise 3: Enabling Remote Desktop 6
Exercise 4: Enabling BranchCache 8
2 Lab Answer Key: Configuring Mobile Computing and Remote Access in Windows 7
Incident Record
2. Click Start, point to All Programs, click Microsoft Office, and then click Microsoft Office Outlook
2007.
4. On the E-mail accounts page, click No, and then click Next.
5. On the Create Data File page, select the Continue with no e-mail support check box, and then
click Finish.
7. If prompted, in the Welcome to the 2007 Microsoft Office System, click Next, click I dont want to
use Microsoft Update, and then click Finish.
10. In the results pane, click the Month tab, and then double-click tomorrow.
11. In the Untitled Event dialog box, in the Subject field, type Production department meeting.
12. In the Location field, type Conference room 1, and then click Save & Close.
16. In the Untitled Contact dialog field, in the Full Name field, type Andrea Dunker.
17. In the Job title box, type IT Department, and then click Save & Close.
7. In the Plan name box, type Dons plan, and then click Next.
8. On the Change settings for the plan: Dons plan page, in the Turn off the display box, click 3
minutes, and then click Create.
2. On the Change settings for the plan: Dons plan page, click Change advanced power settings.
3. Configure the following properties for the plan, and then click OK.
4. On the Change settings for the plan: Dons plan page, click Cancel.
f Task 3: Update the incident record with the power plan changes
1. Update the resolution section of incident record 502509 with the information about the successful
configuration of a power plan for Dons laptop.
3. In the Windows Firewall dialog box, click Allow a program or feature through Windows Firewall.
4. In the Name list, select the Remote Desktop check box, and then select the check boxes for the
Domain, Home/Work, and Public profiles. Click OK.
8. Under Remote Desktop, click Allow connections from computers running any version of
Remote Desktop (less secure).
10. In the Select Users or Groups dialog box, in the Enter the object names to select (examples) box,
type Don, click Check Names, and then click OK.
2. Click Start, point to All Programs, point to Accessories, and then click Remote Desktop
Connection.
3. In the Remote Desktop Connection dialog box, in the Computer box, type lon-cl1, and then click
Options.
5. Under Server authentication, in the If server authentication fails list, click Connect and dont
warn me.
6. Click Connect.
7. In the Windows Security dialog box, in the Password box, type Pa$$w0rd, and then click OK.
f Task 3: Update the incident record with the remote desktop changes
Update the resolution section of incident record 502509 with the information about the successful
configuration remote desktop for Dons laptop.
8 Lab Answer Key: Configuring Mobile Computing and Remote Access in Windows 7
6. In the Slough Plant Properties dialog box, on the Sharing tab, click Advanced Sharing.
7. In the Advanced Sharing dialog box, select the Share this folder check box, and then click
Permissions.
9. In the Select Users, Computers, Service Accounts, or Groups dialog box, in the Enter the object
names to select (examples) box, type production, click Check Names, and then click OK.
10. In the Permissions for Production list, select the Allow check box next to Full Control, and then
click OK.
5. Double-click Set BranchCache Distributed Cache mode, click Enabled, and then click OK.
6. Double-click Configure BranchCache for network files, click Enabled, under Options type 0, and
then click OK.
7. Double-click Set percentage of disk space used for client computer cache, click Enabled, under
Options, type 10, and then click OK.
8. Close Group Policy Management Editor.
9. Close Group Policy Management.
10. Close all open windows.
f Task 8: Update the incident record with the remote desktop changes
Update the resolution section of incident record 502509 with the information about the successful
configuration of BranchCache.